2025-06-10
Synacktiv
Exploiting Heroes of Might and Magic V
Compass Security Blog
LinkedIn for OSINT: tips and tricks
2025-06-09
Schneier on Security
New Way to Track Covertly Android Users
Malwarebytes
How and where to report an online scam
Malwarebytes
Been scammed online? Here’s what to do
Malwarebytes
A week in security (June 1 – June 7)
Embrace The Red
Hosting COM Servers with an MCP Server
Troy Hunt
Weekly Update 455
Amazon Security
Building secure foundations: A guide to network and infrastructure security at AWS re:Inforce 2025
Dark Reading
'Librarian Ghouls' Cyberattackers Strike at Night
Dark Reading
Next-Gen Developers Are a Cybersecurity Powder Keg
Palo Alto Networks
Securing AI Agent Innovation with Prisma AIRS MCP Server
2025-06-08
Ars Technica Security
Cybercriminals turn to “residential proxy” services to hide malicious traffic
2025-06-06
Schneier on Security
Friday Squid Blogging: Squid Run in Southern New England
Schneier on Security
Hearing on the Federal Government and AI
Schneier on Security
Report on the Malicious Uses of AI
Rapid7
Metasploit Wrap-up 06/06/25
Malwarebytes
How to update Chrome on every operating system
Malwarebytes
OpenAI forced to preserve ChatGPT chats
Hunt and Hackett
Cyber Risks in Agriculture: A Guide for Business Leaders
Amazon Security
How to use on-demand rotation for AWS KMS imported keys
Dark Reading
F5 Acquires Agentic AI Security Startup Fletch
Dark Reading
Prep for Layoffs Before They Compromise Security
Ars Technica Security
Millions of low-cost Android devices turn home networks into crime platforms
Datadog HQ
Create rich, up-to-date visualizations of your AWS infrastructure with Cloudcraft in Datadog
Searchlight Cyber
BidenCash Marketplace Seized by U.S. Law Enforcement
2025-06-05
Malwarebytes
Ransomware hiding in fake AI, business tools
Talos Intelligence
Everyone's on the cyber target list
Talos Intelligence
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
Microsoft Security
Connect with us at the Gartner Security & Risk Management Summit
Microsoft Security
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3
Eclypsium
SMM Callout Vulnerabilities in UEFI
Offensive Security
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
Dark Reading
Backdoored Malware Reels in Newbie Cybercriminals
Dark Reading
Finding Balance in US AI Regulation
Krebs on Security
Proxy Services Feast on Ukraine’s IP Address Exodus
Datadog HQ
Announcing Go tracer v2.0.0
Palo Alto Networks
GenAI's Impact — Surging Adoption and Rising Risks in 2025
2025-06-04
Schneier on Security
The Ramifications of Ukraine’s Drone Attack
XPN's Blog
Tokenization Confusion
Okta Security
Enabling ISO/IEC 27001:2022 Compliance with Okta
Dark Reading
35K Solar Devices Vulnerable to Potential Hijacking
Dark Reading
Vishing Crew Targets Salesforce Data
Dark Reading
How Neuroscience Can Help Us Battle 'Alert Fatigue'
Dark Reading
Beware of Device Code Phishing
Bishop Fox Security
2025 Red Team Tools – C2 Frameworks, Active Directory & Network Exploitation
Ars Technica Security
Two certificate authorities booted from the good graces of Chrome
Redteam-Pentesting.de
The Ultimate Guide to Windows Coercion Techniques in 2025
Red Siege InfoSec Blog
Authentication vs. Authorization in Web App Penetration Testing
Datadog HQ
Centrally process and govern your logs in Datadog before sending them to Microsoft Sentinel
Google Safety & Security
Our latest scams survey sees changing online security habits
Searchlight Cyber
Where Does Cyber Risk Come From Within an Organization?
2025-06-03
Schneier on Security
New Linux Vulnerabilities
Rapid7
Introducing AI Attack Coverage in Exposure Command: Secure what traditional AppSec Tools miss
Malwarebytes
Scammers are constantly changing the game, but so are we. Introducing Malwarebytes Scam Guard
Malwarebytes
Juice jacking warnings are back, with a new twist
White Knight Labs
Understanding Use-After-Free (UAF) in Windows Kernel Drivers
Microsoft Security
How Microsoft Defender for Endpoint is redefining endpoint security
Github Security Blog
Hack the model: Build AI security skills with the GitHub Secure Code Game
Github Security Blog
DNS rebinding attacks explained: The lookup is coming from inside the house!
Amazon Security
Implementing just-in-time privileged access to AWS with Microsoft Entra and AWS IAM Identity Center
Dark Reading
How to Approach Security in the Era of AI Agents
Dark Reading
LayerX Launches ExtensionPedia
Dark Reading
'Crocodilus' Sharpens Its Teeth on Android Users
Dark Reading
LummaC2 Fractures as Acreed Malware Becomes Top Dog
Dark Reading
Is Your CISO Navigating Your Flight Path?
Ars Technica Security
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers
ReversingLabs
Why Using SCA to Build Your SBOMs is a Risky Proposition
Palo Alto Networks
Cybersecurity Challenges in the Energy and Utilities Sector